Bookmark and Share
Government Corruption Media Articles
Excerpts of Key Government Corruption Media Articles from Major Media


Below are many highly revealing excerpts of important government corruption articles reported in the mainstream media suggesting a cover-up. Links are provided to the full articles on major media websites. If any link should fail to function, click here. These government corruption articles are listed by article date. For the same list by order of importance, click here. For the list by date posted, click here. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.



Note: For an index to revealing excerpts of media articles on several dozen engaging topics, click here.

Defense lawyers: Did FBI pressure push Boston bomber over the edge?
2014-03-29, Christian Science Monitor
http://www.csmonitor.com/USA/Justice/2014/0329/Defense-lawyers-Did-FBI-pressu...

Three days after an FBI agent was cleared of wrongdoing in the bizarre killing of an associate of slain Boston bombing suspect Tamerlan Tsarnaev, lawyers for Dzhokhar Tsarnaev, the only surviving bombing suspect, alleged that the FBI attempted to recruit the elder Tsarnaev as an informant. Dzhokhar Tsarnaev’s defense team said that new information suggests the FBI interviewed Tamerlan on several occasions before the attack, and even pressured him to surreptitiously report on the Chechen underworld. The Bureau has continued to emphatically state that it didn’t know the identities of the two suspected bombers until they were fingerprinted, and have denied any involvement with the brothers aside from following up on a tip from a Russian emissary that the elder Tsarnaev may have been seeking jihad. In the case of Ibragim Todashev, who allegedly took part with Tamerlan in a robbery turned triple-homicide in Waltham, in 2011, family members have also stated that FBI pressure may have pushed the 20-something ethnic Chechen and mixed martial arts fighter to the brink of violence. Since the terrorist attacks of 9/11, the Bureau has stepped up surveillance of specific racial, ethnic and religious communities, including the use of informants. The tactics have ... left the Bureau open to charges of entrapment, not to mention assorted Internet conspiracy theories. Part of those post-9/11 tactics are the use of “voluntary interviews … often encouraging interviewees to serve as informants in their communities,” writes the American Civil Liberties Union.

Note: Why didn't the FBI reveal its attempt to recruit the elder Tsarnaev when the bombing happened? Something is quite fishy here.




Health conspiracy theories are widely believed
2014-03-19, USA Today
http://www.usatoday.com/story/news/nation/2014/03/19/health-conspiracy-theori...

Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.

Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.




NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls
2014-03-18, Washington Post
http://www.washingtonpost.com/world/national-security/nsa-surveillance-progra...

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.




It’s Official, Secret Money Corrupts
2014-03-18, New York Times blog
http://takingnote.blogs.nytimes.com/2014/03/18/its-official-secret-money-corr...

Lawmakers of both parties are desperately trying to stop the Internal Revenue Service from interfering with the most powerful political invention that ever fell into their laps: the use of non-profit groups as a source of unlimited and anonymous campaign money. An investigation now unfolding in Utah ... exposes in remarkable detail how profoundly the non-profit system can be corrupted for the benefit of a single industry and a single politician. The politician involved was John Swallow, a former lobbyist for an empire of payday-loan and check-cashing companies. When Mr. Swallow ran for Utah Attorney General as a Republican in 2012, his strategist established several social-welfare groups, which don’t have to name their donors, so that the payday-loan industry could support him financially without anyone knowing. The groups collected hundreds of thousands of dollars in secret donations from the industry, and the money was used to run attack ads against Mr. Swallow’s opponent, who wanted to crack down on payday lenders. The ads worked, and Mr. Swallow was elected. When the I.R.S. started looking into the non-profit groups and demanding documentation, ... Congressional Republicans accused the agency (falsely) of singling out conservative non-profit groups. Eventually, a parallel state investigation drove Mr. Swallow from office; he resigned last fall, and last week a state legislative panel accused him of breaching the public trust by hanging “a veritable ‘for sale’ sign on the office door that invited moneyed interests to seek special treatment and favors.”

Note: For more on serious problems with the US electoral system, see the deeply revealing reports from reliable major media sources available here.




China to allow direct yuan, New Zealand dollar trades
2014-03-18, CNBC/Reuters
http://www.cnbc.com/id/101505319

China has allowed direct domestic trading of the yuan against the New Zealand dollar to encourage such trading as it internationalizes the Chinese currency. The move ... comes after China doubled the yuan's trading band over the weekend in a milestone step that gives investors more freedom to set the value of the tightly controlled currency. The move was seen as promoting trade between the two countries, which rose 25.2 percent to NZ$18.2 billion ($15.71 billion) in 2013. As part of China's sweeping plans to overhaul its maturing economy and let market forces drive a host of industries, the government wants to gradually relax its hold over the yuan and turn it into a global reserve currency that one day rivals the dollar. The government's wish to promote international use of the yuan is partly driven by its concern that China is too vulnerable to the fluctuating value of the dollar. China is home to the world's largest foreign exchange reserves, worth $3.82 trillion at the end of last year. About a third is invested in U.S. government bonds. To promote international use of the yuan, China has signed a series of currency swaps with foreign governments in order to increase the overseas circulation of the Chinese currency. The New Zealand dollar is the 10th foreign currency that can be directly traded against the yuan in China.

Note: The US dollar's role as a global currency is gradually fading.




Malaysian investigators conclude missing airliner hijacked
2014-03-15, CBS News/Associated Press
"http://www.cbsnews.com/news/malaysia-airlines-flight-370-more-sinister-theor...

Malaysia's prime minister says the disappearance of Malaysia Airlines Flight 370 appears to be "deliberate." The latest evidence suggests the plane didn't experience a catastrophic incident over the South China Sea as was initially suspected. Prime Minister Najib Razak said the investigation has refocused onto the crew and passengers aboard the missing plane. He added that ... all possibilities are still being investigated. A Malaysian government official who is involved in the investigation said investigators have concluded that one of the pilots or someone else with flying experience hijacked the missing Malaysia Airlines jet. The official said that hijacking was no longer a theory. "It is conclusive." A Malaysian official, who also declined to be identified because he is not authorized to brief the media, said only a skilled aviator could navigate the plane the way it was flown after its last confirmed location over the South China Sea. The official said it had been established with a "more than 50 percent" degree of certainty that military radar had picked up the missing plane after it dropped off civilian radar. Malaysian officials have said radar data suggest it may have turned back and crossed back over the Malaysian peninsula westward, after setting out toward the Chinese capital. The flight altered its course more than once after it lost contact with ground control and that it made significant changes in altitude. Investigators say there's further evidence suggesting the jet did not crash immediately after being lost on radar; a transmitter on the plane tried for another four hours to ping satellites.

Note: Why is the military radar 50% certain? How could a transmitter on the plane ping for four hours, yet no one on the plane made a phone call? Remember that after Flight 93 was hijacked on 9/11, many phone calls were made by passengers on the plane. There is an abundance of high strangeness to this airplane's disappearance. For valuable speculation on the missing flight not well covered in the major media, click here. For some very unusual radar evidence of its disappearance, click here.




Scientists' hidden links to the GM food giants
2014-03-14, Daily Mail (One of the UK's largest-circulation newspapers)
http://www.dailymail.co.uk/news/article-2581387/Scientists-hidden-links-GM-fo...

The authors of a study calling for GM crops to be fast-tracked into Britain’s farms and kitchens all have links to the industry. The report was presented as the work of ‘independent’ scientists and was published on [March 13] by a government advisory body. It was used to support a bid to speed up the development of the controversial crops in the UK, but it has emerged that all five authors have a vested interest in promoting GM crops and food – and some are part-funded by the industry. Critics of GM [have] described the report as ‘biased and downright dangerous’, and accused the biotech giants and the Government of mounting a crude propaganda campaign to overturn public opposition. The academics behind the study were chosen by the Council for Science and Technology, the body that advises the Prime Minister on science policy issues. They include Professor Sir David Baulcombe, from Cambridge University, who works as a consultant for GM firm Syngenta, which gives his department research funding. Syngenta is behind a genetically modified maize or corn, called GA21, which could go into UK farms as early as next spring, making it Britain’s first commercially grown GM crop. Also on the list is Professor Jonathan Jones, of the Sainsbury Laboratory, which is at the centre of Britain’s GM research. It is part-funded by former Labour science minister, Lord Sainsbury, who is one of the country’s biggest supporters of the technology. Another co-author was Professor Jim Dunwell, of the University of Reading. He was a founder member of CropGen, which describes its mission as ‘to make the case for GM crops and foods’

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here. For an excellent summary of the risks and dangers from GMO foods, click here.




U.S. Criticized for Lack of Action on Mortgage Fraud
2014-03-13, New York Times
http://dealbook.nytimes.com/2014/03/13/u-s-overstates-efforts-to-prosecute-mo...

Four years after President Obama promised to crack down on mortgage fraud, his administration has quietly made the crime its lowest priority and has closed hundreds of cases after little or no investigation, the Justice Department’s internal watchdog said on [March 13]. The report by the department’s inspector general undercuts the president’s contentions that the government is holding people responsible for the collapse of the financial and housing markets. The administration has been criticized, in particular, for not pursuing large banks and their executives. The inspector general’s report ... shows that the F.B.I. considered mortgage fraud to be its lowest-ranked national criminal priority. In several large cities, including New York and Los Angeles, F.B.I. agents either ranked mortgage fraud as a low priority or did not rank it at all. The F.B.I. received $196 million from the 2009 to 2011 fiscal years to investigate mortgage fraud, the report said, but the number of pending cases and agents investigating them dropped in 2011. Mortgage fraud was one of the causes of the 2008 financial collapse. Mortgage brokers and lenders falsified documents, sometimes to make mortgages look safer, other times to make the property look more valuable.

Note: For more on government collusion with the banking industry, see the deeply revealing reports from reliable major media sources available here.




US criticised by UN for human rights failings on NSA, guns and drones
2014-03-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/mar/13/us-un-human-rights-abuses-nsa-dr...

The US came under sharp criticism at the UN human rights committee in Geneva on [March 13] for a long list of human rights abuses that included everything from detention without charge at Guantánamo, drone strikes and NSA surveillance, to the death penalty, rampant gun violence and endemic racial inequality. The experts raised questions about the National Security Agency’s surveillance of digital communications in the wake of Edward Snowden’s revelations. The committee’s 18 experts [are] charged with upholding the International Covenant on Civil and Political Rights (ICCPR), a UN treaty that the US ratified in 1992. The US came under sustained criticism for its global counter-terrorism tactics, including the use of unmanned drones to kill al-Qaida suspects, and its transfer of detainees to third countries that might practice torture, such as Algeria. Committee members also highlighted the Obama administration’s failure to prosecute any of the officials responsible for permitting waterboarding and other “enhanced interrogation” techniques under the previous administration. Walter Kälin, a Swiss international human rights lawyer who sits on the committee, attacked the US government’s refusal to recognise the convention’s mandate over its actions beyond its own borders. The US has asserted since 1995 that the ICCPR does not apply to US actions beyond its borders - and has used that “extra-territoriality” claim to justify its actions in Guantánamo and in conflict zones.

Note: How sad that it appears this news was not reported in any major US media.




How the NSA Plans to Infect ‘Millions’ of Computers with Malware
2014-03-12, The Intercept
https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millio...

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.




Snowden: Feinstein a Hypocrite for Blasting CIA Spying
2014-03-12, NBC News
http://www.nbcnews.com/storyline/cia-senate-snooping/snowden-feinstein-hypocr...

Former NSA contractor Edward Snowden accused Sen. Dianne Feinstein of hypocrisy ... for complaining about alleged CIA spying on U.S. senators while tolerating government spying on private citizens. "It's clear the CIA was trying to play 'keep away' with documents relevant to an investigation by their overseers in Congress, and that's a serious constitutional concern,” said Snowden in a statement to NBC News. “But it's equally if not more concerning that we're seeing another 'Merkel Effect,' where an elected official does not care at all that the rights of millions of ordinary citizens are violated by our spies, but suddenly it's a scandal when a politician finds out the same thing happens to them." Snowden was ... referring to German Chancellor Angela Merkel’s indignation at reports that the U.S. had listened in on her personal conversations, but her failure to condemn the NSA for mass surveillance of communications of German citizens. Both were revealed by the release of documents that Snowden took from NSA computers and distributed to journalists.

Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.




NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.




Senator accuses CIA of spying on Congress
2014-03-11, MSNBC
http://www.msnbc.com/msnbc/feinstein-cia-senate

Senate Intelligence Committee Chair Dianne Feinstein accused the CIA on [March 11] of violating the law and the Constitution of the United States by interfering in a committee investigation into Bush-era torture of terror suspects. Feinstein said the CIA had removed documents provided to the committee through a special, segregated network set up by the agency for the committee to pursue its investigation. Among the documents removed was an internal review of CIA interrogation techniques conducted by then-CIA Director Leon Panetta, which committee members have said corroborated committee findings critical of the agency’s interrogation program. “The CIA just went and searched the committee’s computers,” Feinstein said on the Senate floor. “This was done without the knowledge or approval of committee members or staff, and in violation of our written agreements. Further, this type of behavior would not have been possible had the CIA allowed the committee to conduct the review of documents here in the Senate,” Feinstein said. Feinstein said that the CIA’s activities may have violated the Fourth Amendment, the Computer Fraud and Abuse Act, and executive order 12333, which bars the CIA from conducting domestic surveillance. Feinstein also said the CIA’s activities violated the separation of powers principles in the Constitution by interfering with congressional oversight of the executive branch.

Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.




U.S. Nuclear Agency Hid Concerns, Hailed Safety Record as Fukushima Melted
2014-03-10, NBC News
http://www.nbcnews.com/storyline/fukushima-anniversary/u-s-nuclear-agency-hid...

In the tense days after a powerful earthquake and tsunami crippled the Fukushima Daiichi power plant in Japan on March 11, 2011, staff at the U.S. Nuclear Regulatory Commission made a concerted effort to play down the risk of earthquakes and tsunamis to America’s aging nuclear plants, according to thousands of internal emails reviewed by NBC News. The emails, obtained via the Freedom of Information Act, show that the campaign to reassure the public about America’s nuclear industry came as the agency’s own experts were questioning U.S. safety standards and scrambling to determine whether new rules were needed to ensure that the meltdown occurring at the Japanese plant could not occur here. At the end of that long first weekend of the crisis three years ago, NRC Public Affairs Director Eliot Brenner thanked his staff for sticking to the talking points that the team had been distributing to senior officials and the public. "While we know more than these say," Brenner wrote, "we're sticking to this story for now." There are numerous examples in the emails of apparent misdirection or concealment in the initial weeks after the Japanese plant was devastated: When asked to help reporters explain what would happen during the worst-case scenario -- a nuclear meltdown -- the agency declined to address the questions. The emails pull back the curtain on the agency’s efforts to protect the industry it is supposed to regulate. The NRC officials didn't lie, but they didn't always tell the whole truth either. When someone asked about a topic that might reflect negatively on the industry, they changed the subject.

Note: For more on corruption in the nuclear power industry, see the deeply revealing reports from reliable major media sources available here.




I got 30 months in prison. Why does Leon Panetta get a pass?
2014-03-09, Los Angeles Times
http://www.latimes.com/opinion/commentary/la-oe-kiriakou-panetta-whistleblowe...

The confirmation in December that former CIA Director Leon Panetta let classified information slip to "Zero Dark Thirty" screenwriter Mark Boal during a speech at the agency headquarters should result in a criminal espionage charge if there is any truth to Obama administration claims that it isn't enforcing the Espionage Act only against political opponents. I'm one of the people the Obama administration charged with criminal espionage, one of those whose lives were torn apart by being accused, essentially, of betraying [their] country. The president and the attorney general have used the Espionage Act against more people than all other administrations combined, but not against real traitors and spies. The law has been applied selectively, often against whistle-blowers and others who expose illegal, corrupt government actions. After I blew the whistle on the CIA's waterboarding torture program in 2007, I was the subject of a years-long FBI investigation. In 2012, the Justice Department charged me with "disclosing classified information to journalists, including the name of a covert CIA officer and information revealing the role of another CIA employee in classified activities." I had revealed no more than others who were never charged, about activities ... that were hardly secret. I am serving a 30-month sentence. The Espionage Act, the source of the most serious charges against me, was written and passed during World War I and... is so outdated that it refers only to "national defense information" rather than "classified information," because the classification system had not yet been invented.

Note: The author of this article, John Kiriakou, is a former CIA counter-terrorism officer and former senior investigator on the Senate Foreign Relations Committee. He is incarcerated in the Federal Correctional Institution in Loretto, Pa. You can read about his case at http://www.defendjohnk.com. For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.




Raging Against Hacks With Muckraker Turned Magazine-Maker Matt Taibbi
2014-03-09, New York Magazine
http://nymag.com/daily/intelligencer/2014/03/matt-taibbi-on-wall-street-first...

In mid-February, [reporter Matt] Taibbi announced he was leaving Rolling Stone, where he has worked for almost a decade, to start a digital magazine for First Look Media, the company owned by eBay billionaire Pierre Omidyar. The last few weeks have been consumed with business matters—hiring editorial staff, signing off on designs. Taibbi won’t discuss the exact format of the new venture, nor its name—that’s still being worked out, too—but he sees it focusing, in part, on the same matters of corporate malfeasance he’s been covering for years. What people expect, of course, is the ribald, loudly antagonistic voice of a writer who is, in his own words, “full of outrage.” The guy who compared Goldman Sachs to a “vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money.” None of Taibbi’s anger at the “toothlessness” of the media has dissipated. Taibbi says his decision to leave Rolling Stone was predicated in part on ... his desire to “be on Glenn’s side.” Glenn being Glenn Greenwald, who, along with Laura Poitras and Jeremy Scahill, is currently editing another First Look property, the national-security-centric The Intercept, which has been live since February. “Glenn’s in this position of being a reporter trying to put out material that came from a whistle-blower, and now they’re both essentially in exile. It’s crazy. If the press corps that existed in the ’60s and ’70s had seen this situation, they’d be rising as one and denouncing the government for it,” Taibbi says.

Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.




Behind Clash Between C.I.A. and Congress, a Secret Report on Interrogations
2014-03-08, New York Times
http://www.nytimes.com/2014/03/08/us/politics/behind-clash-between-cia-and-co...

It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach. Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee. Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”

Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.




Senate Rejects Blocking Military Commanders From Sexual Assault Cases
2014-03-07, New York Times
http://www.nytimes.com/2014/03/07/us/politics/military-sexual-assault-legisla...

The Senate on [March 6] rejected a ... bill to remove military commanders from decisions over the prosecution of sexual assault cases in the armed forces, delivering a defeat to advocacy groups that argued that wholesale changes are necessary to combat an epidemic of rapes and sexual assaults in the military. The measure, pushed by Senator Kirsten E. Gillibrand, Democrat of New York, received 55 votes — five short of the 60 votes needed. The vote came after a debate on the Senate floor filled with drama and accusations that Ms. Gillibrand and her allies were misguided. The debate pitted the Senate’s 20 women against one another, and seemed bound to leave hard feelings, given that a solid majority of the Senate actually backed Ms. Gillibrand’s proposal. Congress began scrutinizing the sexual assault problem in the military after a recent series of highly publicized cases, including one at the Naval Academy, and after the release of new data from the Pentagon on the issue. On Sept. 30, the end of the last fiscal year, about 1,600 sexual assault cases in the military were awaiting either action from commanders or the completion of criminal investigations. Critics of the military’s handling of such cases say that the official numbers represent a tiny percentage of sexual assault cases, while Ms. Gillibrand said that only one in 10 sexual assaults were reported. She and her supporters argue that forcing victims to go to their commanders to report sexual assaults is similar to forcing a woman to tell her father that her brother has assaulted her.

Note: For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.




Report: CIA spied on Senate committee staff
2014-03-05, CBS News
http://www.cbsnews.com/news/report-cia-spied-on-senate-committee-staff/

As staff for the Senate Intelligence Committee gathered information to conduct oversight of the CIA, the CIA was secretly monitoring them, according to reports from McClatchy [News] and the New York Times. The committee staff was reviewing documents in a secure room at CIA headquarters as part of its investigation into the CIA's now-defunct detention and interrogation program, but the agency was secretly monitoring their work, according to reports. Complaints about the spying have reportedly prompted the CIA inspector general -- the agency's internal watchdog -- to look into the agency's behavior. Sen. Mark Udall, D-Colo., seemed to reference the surveillance in a letter to President Obama ... in which he urged the president to support the fullest declassification of the committee's CIA report. "As you are aware, the C.I.A. has recently taken unprecedented action against the committee in relation to the internal C.I.A. review, and I find these actions to be incredibly troubling for the committee's oversight responsibilities and for our democracy," Udall wrote. "It is essential that the Committee be able to do its oversight work -- consistent with our constitutional principle of the separation of powers -- without the CIA posing impediments or obstacles as it is today." Sen. Martin Heinrich, D-N.M., another member of the intelligence committee, declared in a statement Wednesday, "The Senate Intelligence Committee oversees the CIA, not the other way around."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.




Renting Judges for Secret Rulings
2014-03-01, New York Times
http://www.nytimes.com/2014/03/01/opinion/renting-judges-for-secret-rulings.html

Should wealthy litigants be able to rent state judges and courthouses to decide cases in private and keep the results secret? The answer should be an easy no, but if the judges of Delaware’s Chancery Court persuade the United States Supreme Court to take their case and reverse lower federal court rulings outlawing that practice, corporations will, in Delaware, be able to do just that. The state has long been a magnet for corporate litigation because of its welcoming tax structures and the court’s business expertise. Yet the State Legislature became concerned that Delaware was losing its “pre-eminence” in corporate litigation to a growing market in private dispute resolution. To compete, Delaware passed a law in 2009 offering new privileges to well-heeled businesses. If litigants had at least $1 million at stake and were willing to pay $12,000 in filing fees and $6,000 a day thereafter, they could use Delaware’s chancery judges and courtrooms for what was called an “arbitration” that produced enforceable legal judgments. Instead of open proceedings, filings would not be docketed, the courtroom would be closed to the public and the outcome would be secret. The Delaware Supreme Court could review judgments, but that court has not indicated whether appeals would also be confidential. A group called the Coalition for Open Government, including news and civic organizations, objected that Delaware’s legislation was unconstitutional. In 2012, a federal judge agreed that the law violated the public’s right of access to civil proceedings under the First Amendment.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.





 

As of Apr. 23, 2014, we're $4,300 in the red. Kindly click here to support this important work.

Subscribe to our free email list for two information-packed emails per week at this link.



WantToKnow.info is a PEERS empowerment website